Analysis

  • max time kernel
    146s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:32

General

  • Target

    9f2bdf2e6bfb7f02420ba15d3987f12cf0d024d130a7f3aea6f69d2e628ee61f.exe

  • Size

    73KB

  • MD5

    7afc2565a64699f44344be7dcba04fdf

  • SHA1

    48d18d377e7052e901fa84f7c01aeef85e176ab8

  • SHA256

    9f2bdf2e6bfb7f02420ba15d3987f12cf0d024d130a7f3aea6f69d2e628ee61f

  • SHA512

    6be05523c8e938086e0c894c4f5ebeda4c1304833abfa7f3e6303c9d5ede42990299382a59bfcdb9700b0b2f45d85e130a23a22cad6753f721e0c07fdf303951

  • SSDEEP

    1536:GZpcHolACEPdkvTvNja5ukGSZsnu2gwoX2tJVblN7JPyDwpAJ9NUEuTK:GZp+4AHkTQ7GSSg2ZD7JPcyAJD

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f2bdf2e6bfb7f02420ba15d3987f12cf0d024d130a7f3aea6f69d2e628ee61f.exe
    "C:\Users\Admin\AppData\Local\Temp\9f2bdf2e6bfb7f02420ba15d3987f12cf0d024d130a7f3aea6f69d2e628ee61f.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4180
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.belasmensagens.com.br/amizade/amizade-para-o-infinito-2394.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    7KB

    MD5

    f739b394d30d392d8eb28922bf5a7e12

    SHA1

    78124ad341a0e03ecbb7660011409767e6678fef

    SHA256

    4fff638b8a8f8004eb7a6f5d71ba702373ece50bbe85f499d00d09e7c86dc543

    SHA512

    48cf40407485d1a22f728220a64dc15e85cf051a44104019efa868cc7fccdefcfea2169eea8fb72be819a8c67892aeee72fd22deca31b8bfbd3f8018e55e215f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8F

    Filesize

    232B

    MD5

    6d3e32f5a545e69d1158eb14d31a080a

    SHA1

    0dde89733ec76d40dfa2e0e63e82159d26f95165

    SHA256

    6b5e44e517a27e69a1de59a1060cc69d8fce58052cace3c1815442b1f2c77f72

    SHA512

    2470c2cf2919b242d44fa173d66fa2ba590a78b495c4530f5d9253525e89da8eba6c5af1d20d41219a1d6b4b6e36736560367c9dd6f2fbc55929c91988c29356

  • memory/4180-132-0x0000000000010000-0x000000000005F000-memory.dmp

    Filesize

    316KB

  • memory/4180-133-0x0000000000010000-0x000000000005F000-memory.dmp

    Filesize

    316KB

  • memory/4180-136-0x0000000000010000-0x000000000005F000-memory.dmp

    Filesize

    316KB